CVEdetails.com the ultimate security vulnerability data source
(e.g.: CVE-2009-1234 or 2010-1234 or 20101234)
Log In   Register
Vulnerability Feeds & WidgetsNew   www.itsecdb.com  

Doorgets » Doorgets Cms » 7.0 : Security Vulnerabilities

Cpe Name:cpe:/a:doorgets:doorgets_cms:7.0
Press ESC to close
# CVE ID CWE ID # of Exploits Vulnerability Type(s) Publish Date Update Date Score Gained Access Level Access Complexity Authentication Conf. Integ. Avail.
1 CVE-2019-11626 21 2019-04-30 2019-05-01
5.0
None Remote Low Not required Partial None None
routers/ajaxRouter.php in doorGets 7.0 has a web site physical path leakage vulnerability, as demonstrated by an ajax/index.php?uri=1234%5c request.
2 CVE-2019-11625 89 Sql +Info 2019-04-30 2019-05-01
4.0
None Remote Low Single system Partial None None
doorGets 7.0 has a SQL injection vulnerability in /doorgets/app/requests/user/emailingRequest.php. A remote background administrator privilege user (or a user with permission to manage emailing) could exploit the vulnerability to obtain database sensitive information.
3 CVE-2019-11624 264 2019-04-30 2019-05-01
5.5
None Remote Low Single system None Partial Partial
doorGets 7.0 has an arbitrary file deletion vulnerability in /doorgets/app/requests/user/configurationRequest.php. A remote background administrator privilege user can exploit this vulnerability to delete arbitrary files.
4 CVE-2019-11623 89 Sql +Info 2019-04-30 2019-05-01
4.0
None Remote Low Single system Partial None None
doorGets 7.0 has a SQL injection vulnerability in /doorgets/app/requests/user/configurationRequest.php when action=siteweb. A remote background administrator privilege user (or a user with permission to manage configuration siteweb) could exploit the vulnerability to obtain database sensitive information.
5 CVE-2019-11622 89 Sql +Info 2019-04-30 2019-05-01
4.0
None Remote Low Single system Partial None None
doorGets 7.0 has a SQL injection vulnerability in /doorgets/app/requests/user/modulecategoryRequest.php. A remote background administrator privilege user (or a user with permission to manage modulecategory) could exploit the vulnerability to obtain database sensitive information via modulecategory_edit_titre.
6 CVE-2019-11621 89 Sql +Info 2019-04-30 2019-05-01
4.0
None Remote Low Single system Partial None None
doorGets 7.0 has a SQL injection vulnerability in /doorgets/app/requests/user/configurationRequest.php when action=network. A remote background administrator privilege user (or a user with permission to manage network configuration) could exploit the vulnerability to obtain database sensitive information.
7 CVE-2019-11620 89 Sql +Info 2019-04-30 2019-05-01
4.0
None Remote Low Single system Partial None None
doorGets 7.0 has a SQL injection vulnerability in /doorgets/app/requests/user/modulecategoryRequest.php. A remote background administrator privilege user (or a user with permission to manage modulecategory) could exploit the vulnerability to obtain database sensitive information via modulecategory_add_titre.
8 CVE-2019-11619 89 Sql +Info 2019-04-30 2019-05-01
4.0
None Remote Low Single system Partial None None
doorGets 7.0 has a SQL injection vulnerability in /doorgets/app/requests/user/configurationRequest.php when action=analytics. A remote background administrator privilege user (or a user with permission to manage configuration analytics) could exploit the vulnerability to obtain database sensitive information.
9 CVE-2019-11618 255 +Priv 2019-04-30 2019-05-01
7.5
None Remote Low Not required Partial Partial Partial
doorGets 7.0 has a default administrator credential vulnerability. A remote attacker can use this vulnerability to gain administrator privileges for the creation and modification of articles via an H0XZlT44FcN1j9LTdFc5XRXhlF30UaGe1g3cZY6i1K9 access_token in a uri=blog&action=index&controller=blog action to /api/index.php.
10 CVE-2019-11617 352 CSRF 2019-04-30 2019-05-01
6.8
None Remote Medium Not required Partial Partial Partial
doorGets 7.0 has a CSRF vulnerability in /doorgets/app/requests/user/configurationRequest.php. A remote attacker can exploit this vulnerability for "Google Analytics code" modification.
11 CVE-2019-11616 255 +Info 2019-04-30 2019-05-01
5.0
None Remote Low Not required Partial None None
doorGets 7.0 has a sensitive information disclosure vulnerability in /setup/temp/admin.php and /setup/temp/database.php. A remote unauthenticated attacker could exploit this vulnerability to obtain the administrator password.
12 CVE-2019-11615 434 2019-04-30 2019-05-01
6.5
None Remote Low Single system Partial Partial Partial
/fileman/php/upload.php in doorGets 7.0 has an arbitrary file upload vulnerability. A remote normal registered user can use this vulnerability to upload backdoor files to control the server.
13 CVE-2019-11614 89 Sql +Info 2019-04-30 2019-05-01
5.0
None Remote Low Not required Partial None None
doorGets 7.0 has a SQL injection vulnerability in /doorgets/app/views/ajax/commentView.php. A remote unauthorized attacker could exploit the vulnerability to obtain database sensitive information.
14 CVE-2019-11613 89 Sql +Info 2019-04-30 2019-05-01
4.0
None Remote Low Single system Partial None None
doorGets 7.0 has a SQL injection vulnerability in /doorgets/app/views/ajax/contactView.php. A remote normal registered user could exploit the vulnerability to obtain database sensitive information.
15 CVE-2019-11612 284 2019-04-30 2019-05-01
6.4
None Remote Low Not required None Partial Partial
doorGets 7.0 has an arbitrary file deletion vulnerability in /fileman/php/deletefile.php. A remote unauthenticated attacker can exploit this vulnerability to delete arbitrary files.
16 CVE-2019-11611 200 +Info 2019-04-30 2019-05-01
5.0
None Remote Low Not required Partial None None
doorGets 7.0 has a sensitive information disclosure vulnerability in /fileman/php/download.php. A remote unauthenticated attacker can exploit this vulnerability to obtain server-sensitive information.
17 CVE-2019-11610 200 +Info 2019-04-30 2019-05-01
5.0
None Remote Low Not required Partial None None
doorGets 7.0 has a sensitive information disclosure vulnerability in /fileman/php/downloaddir.php. A remote unauthenticated attacker can exploit this vulnerability to obtain server-sensitive information.
18 CVE-2019-11609 200 +Info 2019-04-30 2019-05-01
6.4
None Remote Low Not required Partial None Partial
doorGets 7.0 has a sensitive information disclosure vulnerability in /fileman/php/movefile.php. A remote unauthenticated attacker can exploit this vulnerability to obtain server-sensitive information or make the server unserviceable.
19 CVE-2019-11608 200 +Info 2019-04-30 2019-05-01
6.4
None Remote Low Not required Partial None Partial
doorGets 7.0 has a sensitive information disclosure vulnerability in /fileman/php/renamefile.php. A remote unauthenticated attacker can exploit this vulnerability to obtain server-sensitive information or make the server unserviceable.
20 CVE-2019-11607 200 +Info 2019-04-30 2019-05-01
5.0
None Remote Low Not required Partial None None
doorGets 7.0 has a sensitive information disclosure vulnerability in /fileman/php/copydir.php. A remote unauthenticated attacker can exploit this vulnerability to obtain server-sensitive information.
21 CVE-2019-11606 200 +Info 2019-04-30 2019-05-01
5.0
None Remote Low Not required Partial None None
doorGets 7.0 has a sensitive information disclosure vulnerability in /fileman/php/copyfile.php. A remote unauthenticated attacker can exploit this vulnerability to obtain server-sensitive information.
Total number of vulnerabilities : 21   Page : 1 (This Page)
CVE is a registred trademark of the MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. CWE is a registred trademark of the MITRE Corporation and the authoritative source of CWE content is MITRE's CWE web site. OVAL is a registered trademark of The MITRE Corporation and the authoritative source of OVAL content is MITRE's OVAL web site.
Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties, implied or otherwise, with regard to this information or its use. Any use of this information is at the user's risk. It is the responsibility of user to evaluate the accuracy, completeness or usefulness of any information, opinion, advice or other content. EACH USER WILL BE SOLELY RESPONSIBLE FOR ANY consequences of his or her direct or indirect use of this web site. ALL WARRANTIES OF ANY KIND ARE EXPRESSLY DISCLAIMED. This site will NOT BE LIABLE FOR ANY DIRECT, INDIRECT or any other kind of loss.